Modules 13 – 16: Home Network Basics Group Exam Answers

Networking Essentials ( Version 2) – Modules 13 – 16: Home Network Basics Group Exam

How to find: Press “Ctrl + F” in the browser and fill in whatever wording is in the question to find that question/answer. If the question is not here, find it in Questions Bank.

NOTE: If you have the new question on this test, please comment Question and Multiple-Choice list in form below this article. We will update answers for you in the shortest time. Thank you! We truly value your contribution to the website.

1. What is CSMA/CA on a network?

  • an access method that is used by wired Ethernet technology to avoid collisions
  • an access method that is used by wireless technology to avoid collisions
  • an access method that is used by wireless technology to avoid duplicate SSIDs
  • an access method that is used by any technology that has excessive collisions

Explanation: Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) is a wireless technology that allows only one device to transmit on a channel at a given moment and prevents collisions from occurring.

2. Which two business and technical challenges does implementing virtualization within a data center help businesses to overcome? (Choose two.)

  • virus and spyware attacks
  • physical footprint
  • operating system license requirements
  • server hardware needs
  • power and air conditioning

Explanation: Traditionally, one server was built within one machine with one operating system. This server required power, a cool environment, and a method of backup. Virtualized servers require more robust hardware than a standard machine because a computer or server that is in a virtual machine commonly shares hardware with one or more servers and operating systems. By placing multiple servers within the same physical case, space is saved. Virtualized systems still need the proper licenses for operating systems or applications or both and still need the proper security applications and settings applied.

3. What is a common countermeasure for Trojan horses?

  • authentication
  • antivirus software
  • firewall
  • encryption

Explanation: The primary means of mitigating virus and Trojan horse attacks is antivirus software. Antivirus software helps prevent hosts from getting infected and spreading malicious code.

4. A student tells a teacher that many junk emails are appearing on a new personal laptop. What is a possible cause of the problem?

  • The new laptop does not have antivirus or anti-spam software installed.
  • The school email server is not functioning properly.
  • The student has spent too much time surfing the web.
  • The laptop needs to be updated to the latest OS version.

Explanation: A new computer should have antivirus, or anti-spam filter for the email client, or anti-spam software installed to protect from spammers.

5. What are three advantages of wireless over wired LAN technology? (Choose three.)

  • higher level of security
  • longer transmission distance
  • ease of expansion
  • lower on-going costs
  • ease of installation

Explanation: Wireless technology can provide anytime, anywhere connectivity and allows devices to stay connected as their location may change. Wireless technology is fairly easy and inexpensive to install and enables networks to be easily expanded, without the limitations of cabled connections.

6. Which wireless RF band do IEEE 802.11b/g devices use?

  • 5 GHz
  • 2.4 GHz
  • 900 MHz
  • 60 GHz

Explanation: 900 MHz is an FCC wireless technology that was used before development of the 802.11 standards. 900 MHz devices have a larger coverage range than the higher frequencies have and do not require line of sight between devices. 802.11b/g/n/ad devices all operate at 2.4 GHz. 802.11a/n/ac/ad devices operate at 5 GHz, and 802.11ad devices operate at 60 GHz.

7. What two IEEE 802.11 wireless standards operate only in the 5 GHz range? (Choose two.)

  • 802.11ad
  • 802.11n
  • 802.11g
  • 802.11ac
  • 802.11b
  • 802.11a

Explanation: The 802.11a and 802.11ac standards operate only in the 5 GHZ range. The 802.11b and 802.11g standards operate only in the 2.4 GHz range. The 802.11n standard operates in both the 2.4 and 5 GHz ranges. The 802.11ad standard operates in the 2.4, 5, and 60 GHz ranges.

8. What wireless router configuration would stop outsiders from using your home network?

  • encryption
  • IP address
  • router location
  • network name

Explanation: Encryption configured on the wireless router can provide secure communications and stop outsiders from using your home network.

9. Which feature is characteristic of MAC filtering in wireless networks?

  • It allows only authorized users to detect the network.
  • It restricts computer access to a wireless network.
  • It is configured on the computer rather than on the router.
  • It encrypts data that is transmitted on a wireless network.

Explanation: MAC address filtering uses the MAC address to identify which devices are allowed to connect to the wireless network.

10. What are two types of wired high-speed Internet connections? (Choose two.)

  • dial-up
  • cellular
  • satellite
  • cable
  • DSL

Explanation: Cable and DSL Internet technologies both use physical cabling to provide an Internet connection to a residence or a small business. Although dial-up is a wired technology, it does not provide a high-speed Internet connection. Satellite and cellular connections provide a wireless Internet connection.

11. Which type of device provides an Internet connection through the use of a phone jack?

  • DSL modem
  • satellite modem
  • cable modem
  • Wi-Fi AP

Explanation: DSL technology uses the existing telephone network. For that reason, a DSL modem commonly has an RJ-11 phone port.

12. Which cloud computing opportunity would provide the use of network hardware such as routers and switches for a particular company?

  • browser as a service (BaaS)
  • infrastructure as a service (IaaS)
  • software as a service (SaaS)
  • wireless as a service (WaaS)

Explanation: This item is based on information contained in the presentation.
Routers, switches, and firewalls are infrastructure devices that can be provided in the cloud.

13. What technology allows users to access data anywhere and at any time?

  • Cloud computing
  • virtualization
  • micromarketing
  • data analytics

Explanation: Cloud computing allows organizations to eliminate the need for on-site IT equipment, maintenance, and management. Cloud computing allows organizations to expand their services or capabilities while avoiding the increased costs of energy and space.

14. Which three steps must be completed to manually connect an Android or IOS device to a secured wireless network? (Choose three.)

  • Set the IP address.
  • Activate the Bluetooth antenna.
  • Input the authentication password.
  • Enter the network SSID.
  • Change the MAC address.
  • Choose the correct security type.

Explanation: In order to connect an Android or IOS device to a Wi-Fi network manually, perform these steps:
Enter the network SSID of the wireless network.
Choose the security type used by the wireless network.
Input the password to authenticate successfully.

15. Which statement accurately characterizes the evolution of threats to network security?

  • Internet architects planned for network security from the beginning.
  • Early Internet users often engaged in activities that would harm other users.
  • Threats have become less sophisticated while the technical knowledge needed by an attacker has grown.
  • Internal threats can cause even greater damage than external threats.

Explanation: Internal threats can be intentional or accidental and cause greater damage than external threats because the internal user has direct access to the internal corporate network and corporate data.

16. Which type of attack exploits human behavior to gain confidential information?​

  • social engineering
  • denial of service
  • spyware
  • virus

Explanation: Social engineering attacks deceive users into revealing private information or performing specific actions.

17. Which three attacks exploit human behavior? (Choose three.)

  • malware
  • brute force
  • vishing
  • zombies
  • pretexting
  • phishing

Explanation: Attacks aimed at exploiting human behavior such as pretexting, phishing, and vishing are commonly used by hackers to obtain information directly from authorized users.​​

18. What is a characteristic of a computer worm?

  • exploits vulnerabilities with the intent of propagating itself across a network
  • a set of computer instructions that lies dormant until triggered by a specific event
  • tricks users into running the infected software
  • malicious software that copies itself into other executable programs

Explanation: A worm is similar to a virus. However, a worm is self-spreading and can send copies of itself to connected hosts over the network.

19. Which type of attack involves an attacker using a powerful computer to try a large number of possible passwords in rapid succession to gain access to a system​?

  • brute force
  • pretexting
  • phishing
  • DDoS

Explanation: In a brute force attack an attacker will try to gain access to a system by guessing passwords as fast as possible.

20. What happens when a wireless access point is configured to stop broadcasting the SSID?

  • Computer access to the wireless access point is restricted.
  • The identity of the network is freely broadcast.
  • Signals are prevented from transmission outside the boundaries of the local network.
  • The network is invisible to those who are unaware of the SSID.

Explanation: By default, wireless routers and access points broadcast SSIDs to all computers within the wireless range. This allows any wireless client to detect the network and to connect to it. The SSID broadcast feature can be turned off. When it is turned off, the network is no longer made public. It becomes invisible to clients that are not manually configured with the SSID.

21. Why should WEP not be used in wireless networks today?

  • its lack of support
  • its age
  • its lack of encryption
  • easily crackable
  • its use of clear text passwords

Explanation: Despite improvements, WEP is still vulnerable to various security issues including the ability to be cracked.

22. What specialized network device is responsible for permitting or blocking traffic between networks?

  • access point
  • switch
  • bridge
  • firewall

Explanation: Firewalls are used to permit or block traffic between networks according to access control policies.

23. An administrator wants to configure a router so that users on the outside network can only establish HTTP connections to the internal web site. Which feature would the administrator configure to accomplish this?

  • PAT
  • NAT overload
  • static NAT
  • port forwarding

Explanation: Port forwarding allows connections to one port on the external interface to be redirected to a specific device and a specific port on the inside interface. In this way specific inside services can be accessible from the outside network without permitting all traffic to the inside device.

24. What is the purpose of a DMZ?

  • It provides secure connectivity for clients that connect to the internal network through a wireless LAN.
  • It creates an encrypted and authenticated tunnel for remote hosts to access the internal network.
  • It analyzes traffic for intrusion attempts and sends reports to management stations.
  • It allows external hosts to access specific company servers while maintaining the security restrictions for the internal network.

Explanation: The DMZ is an area of the network that is accessible to both internal and external users. It is more secure than the external network but not as secure as the internal network. It allows external hosts to access internal servers.


Related Articles

guest
1 Comment
Inline Feedbacks
View all comments
Ramona Barabas
Ramona Barabas
2 months ago

What is a characteristic of a computer worm?

  • exploits vulnerabilities with the intent of propagating itself across a network
  • malicious software that copies itself into other executable programs
  • tricks users into running the infected software
  • a set of computer instructions that lies dormant until triggered by a specific event